A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
The market for IT VRM software exists to enable the assessment, monitoring and remediation of risks arising from the use of IT vendors and IT service providers. Gartner's first Magic Quadrant on this small but growing market evaluates 10 vendors to help you in your vendor evaluation process.
Download this white...
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
Today's flood of digital data-flowing from hundreds of millions of devices and contained in billions of online transmissions and transactions-often presents organizations with more raw information than they are able to absorb.
Even more worrisome, this data deluge provides cyber criminals with a means to hide...
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
Every company will have a different path to mobile adoption, and final implementations will vary, depending on the needs of various business functions and on regulations that impact mobile policies. A simple way to evaluate where a business is and where it wants to be is to look at devices in terms of who owns them,...
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Credit rating models transformed the way we do business and have existed for almost a century. Now, these same models are inspiring a new way of managing vendor security risk by using externally collected security data to assess and quantify security performance.
Download this white paper to learn:
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
The FTC has reached settlements with online review site Yelp and mobile app developer TinyCo on charges that they improperly collected children's information in violation of the Children's Online Privacy Protection Act.